IT/CYSE 200T

Assignments

Below are some of the assignments that I’ve completed in CYSE 200T, particularly ones that have helped me better understand the course’s learning outcomes and cybersecurity as a whole.

Discussion Board: Protecting Availability

In this discussion board, you are the CISO for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)?

Write-Up: Exploring Attacks on Availability

In this assignment, you will research and analyze different types of cyberattacks that target the availability of systems, networks, or data, which is one of the core principles of cybersecurity. Known as “Attacks on Availability,” these are incidents where malicious actors attempt to disrupt access to critical resources, making them inaccessible to users. Such attacks can include Distributed Denial of Service (DDoS), ransomware, and other forms that focus on hindering legitimate access.

Objective: You are tasked with providing a concise, 250-word summary of a specific attack on availability. Use recent online sources to explore how these attacks occur, their impact on organizations, and possible defenses. Be sure to cite at least one reputable source to support your analysis.

In your response, address the following:

  • Define what is meant by an “attack on availability.”
  • Describe a recent example of such an attack or a common technique used in these attacks.
  • Briefly discuss the broader implications of these attacks on organizations and users.

Write-Up: SCADA Systems

In this write-up you will use the SCADA Systems article, along with your own research, to explain the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks.

This write-up is to be IN YOUR OWN WORDS, and must reference the aforementioned article, and at least one additional source of your choosing.

Business writing skills apply and account for 50% of the final grade.

Write-Up: The Human Factor in Cybersecurity

During this week’s reading, you’ve been exposed to different points of view regarding human contribution to cyber threats.  Now, put on your Chief Information Security Officer hat.  Realizing that you have a limited budget (the amount is unimportant), how would you balance the tradeoff of training and additional cybersecurity technology?  That is, how would you allocate your limited funds?  Explain your reasoning.